Turning to Access Control Turnstiles

Dingle, Jeffrey
March 2008
Security: Solutions for Enterprise Security Leaders;Mar2008, Vol. 45 Issue 3, p74
Trade Publication
The article offers information about the concept of turnstiles, a security tool for access control. It discusses the mechanisms of the three categories of turnstiles including mechanical, optical and video. It outlines several companies which have been in the turnstile business for years such as Perey Turnstiles, Alvarado Manufacturing Co. Inc. and Biodata Ltd. According to the author, turnstiles are great security systems but are underused.


Related Articles

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • FULL HEIGHT TURNSTILES UPGRADED.  // SDM: Security Distributing & Marketing;Mar2011, Vol. 41 Issue 3, p198 

    The article offers brief information on the HydraLine Speed Control from Alvarado Manufacturing Co. Inc.

  • Selling Secrets. Baker, Glenn // New Zealand Management;Jul2004, Vol. 51 Issue 6, p54 

    Focuses on ways to secure business enterprises. Threats of technological innovation to businesses; Advantages of a spyware software to the security of companies; Importance of the staff to ensure an effective enterprise security. INSET: DOCUMENT DESTRUCTION.

  • Creating Security's Strategic Plan. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p44 

    The author provides tips on how to create a strategic security plan. He cites the importance of considering the important elements in a security plan and defining the responsibilities and functions of the company's security department and personnel. The author advises to create an identification...

  • Keeping Access Simple. Mesenbrink, John // Security: Solutions for Enterprise Security Leaders;Dec2003, Vol. 40 Issue 11, p27 

    Looks into the use of access control technology for the security of establishments in the U.S. Factors considered by end users in the choice of access control technologies; Advantages in the use of the technology by the firms; Features of the developed control systems.

  • Open Architecture for Property Management.  // Security: Solutions for Enterprise Security Leaders;May2005, Vol. 42 Issue 5, p18 

    Reports on the utilization of access control solutions protection technology by Stiles Property Management to secure its facilities in Florida. Design and installation of the access control systems; Provision of scalability to accommodate new building applications; Aid of the access control...

  • Video Verification: Use it Wisely! Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p42 

    The article discusses the importance of using video verification efficiently in security management in the U.S. It mentions that the use of video cameras in security systems verify whether an intrustion alarm is false or genuine. It states that video verification in electronic access control...

  • Back Doors and Magic Words. Dingle, Jeff // Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p38 

    The article reflects on the design of access control systems. The technique of using "secret back doors" in ID and access control systems for convenience and ease of access for maintenance and security is common in the design of these systems. It also discusses the "zero in/zero out" personnel...

  • WHAT CUSTOMERS WANT IN ACCESS CONTROL. Gager, Russ // SDM: Security Distributing & Marketing;Aug2005, Vol. 35 Issue 8, p65 

    Presents the findings of an online survey on the use of access control technologies by U.S. firms. Scope and coverage; Respondents of the survey; Types of technologies preferred by most end-user companies; Factors affecting companies' choice of technologies. INSET: Service, Confidence,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics